Links to MAHs
•
Threats can be malicious or accidental
•
They can originate from networks
(Intranet, or internet), or through
maintenance activities. E.g. software
upgrades, USB sticks, lap tops etc.
•
Equipment can have malware when it is
delivered to site or can be introduced via
maintenance personnel from vendors.
The controls by vendors are important